Completely handling SQL injection consists of two activities: properly protecting the system from malicious input, and preventing any resultant error messages caused by SQL injecti...
End users of Adaptive Hypermedia Systems (AHS) receive an experience that has been tailored towards their specific needs. Several AHS have produced favourable results showing benef...
Current surveillance systems use multiple sensors and media processing techniques in order to record/detect information of interest in terms of events. Assessing the quality of in...
M. Anwar Hossain, Pradeep K. Atrey, Abdulmotaleb E...
Monitoring and information services form a key component of a distributed system, or Grid. A quantitative study of such services can aid in understanding the performance limitatio...
Xuehai Zhang, Jeffrey L. Freschl, Jennifer M. Scho...
This paper describes novel market-based technologies for systematic, quantifiable and predictable protection of information systems against attacks. These technologies, incorporate...